Scams

fraud, scams, hoax & hackers!

Archive for the ‘computer fraud’ Category

The ATM Skimmer Scam

Posted by Awareness

The Definition: The ATM Scam is costing citizens of the U.K. £75 million per year – it is a high-tech hustle wherein the scammers attach a device over the slot of an ATM machine. This device will read all the information from the magnetic strip on the back of your card, and record for future use by the thieves. It still allows the genuine ATM reader to accept your information and dispense money, so the mark has no clue that he has just been the victim of an electronic rip-off.

The Mark: Nobody is immune, and no individual is more or less susceptible than another – with the exception of those visiting this site, that is. Armed with the lessons that shining a bright light on this hustle will teach you, you have a much better chance of avoiding this swindle.

The Scam: Our thieves have for the moment morphed into a “geek squad,” putting their technical talents to work fabricating a magnetic-strip reader. This will be fitted to a slot that will overlay the actual slot on an ATM machine. When it is in place, only careful examination will reveal that it is not an original part of the machine, but a nefarious add-on designed to steal sensitive information. The device is called a “skimmer.” Also built into this fabricated piece is a pin-hole camera, which will capture your PIN as you punch it into the keyboard.

Our scammer finds a likely cash point location, and when alone, casually performs what looks like a normal ATM transaction. But what he has really done is the equivalent of a highwayman setting up an ambush on a country road – he has installed a device that will ambush the precious information on your ATM card’s magnetic strip.

Read the rest of this entry »

The bluetooth hack

Posted by Awareness

The Definition: The Bluetooth Hack. You may have never heard of the term “blue-jacking”, and you certainly hope you are never its victim. When your phone is blue-jacked, a scammer can take control of your mobile and use it to make himself quite a handsome payday, indeed.

The Mark: Any owner of a Bluetooth enabled mobile phone – if he has forgotten to disable the Bluetooth when he is not using it. As is typical, a mark is someone who is too lazy, or too careless, or too just-plain uninformed. Visitors to this site have no such excuse.

The Scam: The piece of equipment that is key to pulling off this scam is a mobile pocket PC, set up to hunt for a blue-tooth connection. Due to a flaw in many Bluetooth enabled mobile phones, a remote mobile looking for a signal can actually pick up the signal of another nearby mobile. This defect is the only crack in the armor our modern-day cons need to exploit your phone, and your wallet.

Our scammer works in any crowded public place, seemingly intent on his pocket PC, but in reality searching for a signal to blue-jack. When he finds one, he has two jobs: one is to stay in range so he can control the hijacked phone; the other is to use his PC to make a call on the hijacked line. This is where the hustler stuffs his pockets.

Prior to instituting the scam, our con men have set up a premium-rate telephone line, which will charge those who call the line £1.50 per minute of call time. So all our hustler has to do, whilst in range of the mark’s phone, is dial up the premium-rate line using the mark’s connection and keep that connection going as long as possible. Every minute that goes by makes him a little richer.

Read the rest of this entry »

The Wi-Fi Scam

Posted by Awareness

The Definition: The Wi-Fi Scam is scamming gone high-tech. Setting up in one of the now-common free, wireless access locations so frequently found in hotel lobbies, airports or coffee shops, our hustler-turned-techie steals credit card information from unsuspecting marks. Before he leaves the area, he has gone on an on-line shopping spree, and left a roomful of dupes with fraudulent credit card charges.

The Mark: It is becoming more and more common these days for laptop owners to use their computers on unsecured networks in public places. These Wi-Fi access points are quite accommodating and convenient, but unless your anti-scam program is running, you, too can be a victim of the Wi-Fi hustle.

The Scam: Hustling has been around as long as money, and the art of the scam has proven to be as adaptable as mankind itself. When technology advances, larceny advances with it.

So it is with the Wi-Fi Scam. Having pre-tested his system, the swindler enters a hotel lobby or airport waiting area and sets up his laptop. He has configured it so that his laptop can hijack the internet signal at the access point – because of its proximity to other users, he putting out a more powerful signal than the hotel, café or airport.

As the marks filter in and set up their computers, little do they know that when they attempt to log on, it will be the scammer’s network onto which they will be logging – not the hotels.

Read the rest of this entry »

The real Hustle – The Laptop Theft Scam

Posted by Awareness

Definition: The Laptop Scam involves some sophisticated sleight-of-hand and choreography on the part of the scammers. Unlike other hustles that rely on the mark’s gullibility, this feat of legerdemain magically makes your valuable computer disappear into thin air.

The Mark: A typical business traveler, pre-occupied with his work and his flight. He’s traveling with his laptop – but unfortunately, he’s also traveling with a false sense of airport security.

The Scam: Often worth more than money, the value of information stored on your computer’s hard drive may be incalculable. Though we all take great pains to insure that proper back-ups are done and kept up-to-date, experience tells us that this is not always the case. For this reason, the Lap-Top Scam can teach us one of the more painful lessons we learn in life – in many ways more wrenching than the loss of mere money, or other personal property.

Read the rest of this entry »

Tutorial – How to avoid key-loggers

Posted by Awareness

Tutorial – How to avoid key-loggers

Definition: What is a key-logger? A key-logger is a device (physical device, hardware) or a computer program (software). The aim of this device/program is to log all keystrokes that are generated from a keyboard. The keystrokes are secretly logged without the PC user knowing that whatever he types can be viewed by someone else. Usually, the person who has installed the key-logger can retrieve the log by pressing a combination of keys simultaneously and/or by providing a secret password. In some cases, the key-logger is also able to transmit the log remotely using email, Bluetooth signals or other methods.

Read the rest of this entry »

About Us

    About Scamplots

    First of all, all information, concepts & illustrations presented in this website are here to protect you.
    Who are we protecting you from? If you don't know the answer to this question then you shouldn't be reading this page at all.

    "If you know the enemy and know yourself, you need NOT fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." - Sun Tzu.
    We will try to let you know as many things as possible about the enemy & the modern 'modus operandi' of crooks. However, getting to know yourself & learning to recognize newly-introduced scam/fraud patterns is your own responsibility.

    Why are we taking thing so seriously? Well, the truth is that as time passes and technology advances scams & frauds are getting more and more dangerous.

    Be Careful: If you misuse information provided in this website you might end up in jail. Again, all information in this website is here to protect you.

2008 © SCAMPLOTS.COM